The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 1.4.5 (including) | 1.4.5 (including) |
Wireshark | Ubuntu | hardy | * |
Wireshark | Ubuntu | lucid | * |
Wireshark | Ubuntu | maverick | * |
Wireshark | Ubuntu | upstream | * |